Skip to main content
Top

2015 | OriginalPaper | Chapter

Security Risk Assessment of Rich Communication Services Over LTE

Authors : Xin He, Huiyun Jing

Published in: Trustworthy Computing and Services

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

To deal with the threat of over the top (OTT) applications, many operators launch their own rich communication services over LTE. China Mobile also declares the overall commercial of rich communication services in 2015. The rich communication services integrate abundant multimedia, media and social characteristics into the traditional telecom services. While these characteristics provide a superior user experience, they also attract the scammers to utilize these services as the new channel of spreading digital misinformation, launching mass events, phishing and so on. Besides these, the LTE/SAE network and user terminals also pose much security challenges to the RCS services. In this paper, we firstly and systematically assess the security risk of rich communication services based on their three-tier architecture, which aims at improving the security of rich communication services.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Henry, K., Liu, Q., Pasquereau, S.: Rich communication suite. In: International Conference on Intelligence in Next Generation Networks (2009) Henry, K., Liu, Q., Pasquereau, S.: Rich communication suite. In: International Conference on Intelligence in Next Generation Networks (2009)
2.
go back to reference Park, Y., Park, T.: A survey of security threats on 4G networks. In: IEEE GlOBECOM Workshops (2007) Park, Y., Park, T.: A survey of security threats on 4G networks. In: IEEE GlOBECOM Workshops (2007)
3.
go back to reference Cook, N.: Rich communications suite: opportunities and threats. Comput. Fraud Secur. 4, 9–11 (2012)CrossRef Cook, N.: Rich communications suite: opportunities and threats. Comput. Fraud Secur. 4, 9–11 (2012)CrossRef
4.
go back to reference Cao, J., Ma, M., Li, H., et al.: A survey on security aspects for LTE and LTE-a networks. IEEE Commun. Surv. Tutor. 16(1), 283–302 (2014)CrossRef Cao, J., Ma, M., Li, H., et al.: A survey on security aspects for LTE and LTE-a networks. IEEE Commun. Surv. Tutor. 16(1), 283–302 (2014)CrossRef
5.
go back to reference Da, Y., Wushao, W.: Non-access-stratum request attack in E-UTRAN. In: Computing, Communications and Applications Conference (2012) Da, Y., Wushao, W.: Non-access-stratum request attack in E-UTRAN. In: Computing, Communications and Applications Conference (2012)
6.
go back to reference Forsberg, D., Huang, L., Tsuyoshi, K., Alanara, S.: Enhancing security and privacy in 3GPP E-UTRAN radio interface. In: Personal, Indoor and Mobile Radio Communications (2007) Forsberg, D., Huang, L., Tsuyoshi, K., Alanara, S.: Enhancing security and privacy in 3GPP E-UTRAN radio interface. In: Personal, Indoor and Mobile Radio Communications (2007)
7.
go back to reference Kambourakis, G., Kolias, C., Gritzalis, S., Park, J.: DoS attacks exploiting signaling in UMTS and IMS. Comput. Commun. 34(3), 226–235 (2011)CrossRef Kambourakis, G., Kolias, C., Gritzalis, S., Park, J.: DoS attacks exploiting signaling in UMTS and IMS. Comput. Commun. 34(3), 226–235 (2011)CrossRef
8.
go back to reference Felt, A., Finifter, M., Chin, E., et al.: A survey of mobile malware in the wild. In: ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (2011) Felt, A., Finifter, M., Chin, E., et al.: A survey of mobile malware in the wild. In: ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (2011)
9.
go back to reference Barrera, D., Van, P.: Secure software installation on smartphones. IEEE Secur. Priv. 9(3), 42–48 (2001)CrossRef Barrera, D., Van, P.: Secure software installation on smartphones. IEEE Secur. Priv. 9(3), 42–48 (2001)CrossRef
Metadata
Title
Security Risk Assessment of Rich Communication Services Over LTE
Authors
Xin He
Huiyun Jing
Copyright Year
2015
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-47401-3_16

Premium Partner